International Journal of Computational Intelligence Systems
Vahid Seydi Ghomsheh, Mohamad Teshnehlab, Mahdi Aliyari Shoorehdeli, Mojtaba Ahmadieh Khanesar
Pages: 0 - 0
Tianrui Li, Yang Xu
Pages: 0 - 0
F. Herrera, L. Martínez
Pages: 0 - 0
Jesus Alcal´a-Fdez, Jose M. Alonso
Pages: 0 - 0
Tianrui Li, Pawan Lingras, Yuefeng Li, Joseph Herbert
Pages: 0 - 0
Wuhong Wang, Klaus Bengler
Pages: 0 - 0
Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren, JonathanZ. Sun, Fengying Wang
Pages: 1 - 12
We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic semantics of secret share. We also present an encoding...
Near-Duplicate Web Page Detection: An Efficient Approach Using Clustering, Sentence Feature and Fingerprinting
J. Prasanna Kumar, P. Govindarajulu
Pages: 1 - 13
Duplicate and near-duplicate web pages are the chief concerns for web search engines. In reality, they incur enormous space to store the indexes, ultimately slowing down and increasing the cost of serving results. A variety of techniques have been developed to identify pairs of web pages that are “similar”...
Jesús Alcalá-Fdez, JoseM. Alonso
Pages: 1 - 2
Jing Wei, Zhao Hai, Song Chunhe, Zhu Hongbo
Pages: 1 - 11
This paper addresses the issue of non-uniform motion deblurring for a single photograph. The main difficulty of spatially variant motion deblurring is that, the deconvolution algorithm can not directly be used to estimate blur kernel, due to the kernel of different pixels are different with each other....
Macarena Espinilla, Javier Montero, J. Tinguaro Rodríguez
Pages: 1 - 5
In this preface we stress the relevance of the traditional collaboration between Engineering and any field of Mathematics in order to build intelligent decision-aid tools, as it is illustrated by the twelve papers contained in this Special Issue. These papers, selected by means of a standard peer review...
Chen-Fu Chien, Minqiang Li
Pages: 1 - 2
A Desirability Function-Based Relatively Optimal Interval Core Model and an Algorithm for Fuzzy Profit Allocation Problems of Enterprise Strategy Alliance
Fei Guan, Qiang Zhang
Pages: 1 - 13
Enterprise strategic alliance is a win-win business competition mode that has been developed in both academia and industry. How to allocate total profit fairly in an uncertain environment, however, is an important factor affecting the stability of the strategic alliance. To handle this problem, this...
Pages: 1 - 2
Pavel Anselmo Alvarez, Rafael Bello Perez
Pages: 1 - 2
Luis Martínez, Jie Lu
Pages: 1 - 2
Ronald R. Yager
Pages: 1 - 18
SOME MEASURES RELATING PARTITIONS USEFUL FOR COMPUTATIONAL INTELLIGENCE We investigate a number of measures relating partitions. One class of measures we consider are congru- ence measures. These measures are used to calculate the similarity between two partitionings. We provide a number of examples...
Yonggang Chen, Yunrui Guo, Wenlin Li
Pages: 1 - 9
This paper considers the robust stability analysis problem for a class of uncertain stochastic neural net- works with time-varying delay. Based on the Lyapunov functional method, and by resorting to the new technique for estimating the upper bound of the stochastic derivative of Lyapunov functionals,...
Pages: 1 - 7
High-stakes (dangerous, catastrophic) risks take on a wider profile as progress unfolds. What are the impacts of technological and social change on the risk landscape? Due to the complexities and dynamics involved, we can only answer these questions approximately. By using the concept of fuzziness, we...
A New Clonal Selection Immune Algorithm with Perturbation Guiding Search and Nonuniform Hypermutation
Zaijin Zou, Xinchao Zhao, Shuliang Zhao, Guoshuai Zhao, Shaozhang Niu, Guoli Liu
Pages: 1 - 17
A new clonal selection immune algorithm with perturbation guiding search and non-uniform hypermutation (nCSIA) is proposed based on the idea of perturbed particle swarm algorithm and non-uniform mutation. The proposed algorithm proportional clones antibody based on the affinity, adaptively adjusts the...
Huaxiong Li, Xianzhong Zhou
Pages: 1 - 11
Rough set theory has witnessed great success in data mining and knowledge discovery, which provides a good support for decision making on a certain data. However, a practical decision problem always shows diversity under the same circumstance according to different personality of the decision makers....
Bare bones particle swarm optimization with adaptive chaotic jump for feature selection in classification
Pages: 1 - 14
Feature selection (FS) is a crucial data pre-processing process in classification problems. It aims to reduce the dimensionality of the problem by eliminating irrelevant or redundant features while achieve similar or even higher classification accuracy than using all the features. As a variant of particle...
Comparing Circular Histograms by Using Modulo Similarity and Maximum Pair-Assignment Compatibility Measure
Pasi Luukka, Mikael Collan
Pages: 1 - 12
Histograms are an intuitively understandable tool for graphically presenting frequency data that is available for and useful in modern data-analysis, this also makes comparing histograms an interesting field of research. The concept of similarity and similarity measures have been gaining in importance,...
Jun Luo, Hongjun Wang, Xun Gong, Tianrui Li
Pages: 1 - 9
In Cloud environments, the relationship between resources and users is more ad hoc and dynamic. The role-based access control (RBAC) model is an appropriate access control model for Cloud environments. When using the RBAC model in Cloud environments, some new elements should be considered. This paper...
Pages: 1 - 12
In this study we investigate information processing in deep neural network models. We demonstrate that unsupervised training of autoencoder models of certain class can result in emergence of compact and structured internal representation of the input data space that can be correlated with higher level...
Almost Automorphic Solutions to Cellular Neural Networks With Neutral Type Delays and Leakage Delays on Time Scales
Changjin Xu, Maoxin Liao, Peiluan Li, Zixin Liu
Pages: 1 - 11
In this paper, cellular neural networks (CNNs) with neutral type delays and time-varying leakage delays are investigated. By applying the existence of the exponential dichotomy of linear dynamic equations on time scales, a fixed point theorem and the theory of calculus on time scales, a set of sufficient...
Renshu Wang, Jing Zhao
Pages: 1 - 10
Load of transformer in distribution grid fluctuates according to many factors, resulting in overload frequently which affects the safety of power grid. And short-term load forecasting is considered. To improve forecasting accuracy, the input information and the model structure are both considered. First,...
JoséM. Cadenas, M. Carmen Garrido, Raquel Martínez
Pages: 3 - 17
Every day there are more techniques that can work with low quality data. As a result, issues related to data quality have become more crucial and have consumed a majority of the time and budget of data mining projects. One problem for researchers is the lack of low quality data in order to test their...
Yangjian Ji, Tianyin Tang, Chunyang Yu, Guoning Qi
Pages: 3 - 14
With the development of modern technologies and global manufacturing, it becomes more difficult for companies to distinguish themselves from their competitors. In order to keep their competitive advantages, companies must properly position their product families by offering a right product portfolio...
Alisson Marques Silva, Walmir Caminhas, Andre Lemos, Fernando Gomide
Pages: 3 - 14
This paper suggests an evolving approach to develop neural fuzzy networks for system modeling. The approach uses an incremental learning procedure to simultaneously select the model inputs, to choose the neural network structure, and to update the network weights. models with larger and smaller number...
Feature Selection for Multi-label Learning: A Systematic Literature Review and Some Experimental Evaluations
Newton Spolaôr, Huei Diana Lee, Weber Shoity Resende Takaki, Feng Chung Wu
Pages: 3 - 15
Feature selection can remove non-important features from the data and promote better classifiers. This task, when applied to multi-label data where each instance is associated with a set of labels, supports emerging applications. Although multi-label data usually exhibit label relations, label dependence...
Cengiz Kahraman, Başar Öztayşi, Sezi Çevik Onar
Pages: 3 - 24
Fuzzy sets have a great progress in every scientific research area. It found many application areas in both theoretical and practical studies from engineering area to arts and humanities, from computer science to health sciences, and from life sciences to physical sciences. In this paper, a comprehensive...
Aida Jarraya, Philippe Leray, Afif Masmoudi
Pages: 6 - 17
The Bayesian estimation of the conditional Gaussian parameter needs to define several a priori parameters. The proposed approach is free from this definition of priors. We use the Implicit estimation method for learning from observations without a prior knowledge. We illustrate the interest of such an...
Victoria Lopez, Matilde Santos, Javier Montero
Pages: 8 - 20
In this paper we present a software tool designed as a decision aid system for all actors being involved when buying or selling real state, client and realtor, where a main objective for the commercial is to concentrate the client preferences into few alternatives. Since the required previous analysis...
Shuchita Upadhyaya, Alka Arora, Rajni Jain
Pages: 10 - 16
Clustering algorithms give general description of clusters, listing number of clusters and member entities in those clusters. However, these algorithms lack in generating cluster description in the form of pattern. From data mining perspective, pattern learning from clusters is as important as cluster...
Cardinal, Median Value, Variance and Covariance of Exponential Fuzzy Numbers with Shape Function and its Applications in Ranking Fuzzy Numbers
Pages: 10 - 24
In this paper, the researcher proposed a method to cardinal, median value, variance and covariance of exponential fuzzy numbers with shape function . The covariance used in this method is obtained from the exponential trapezoidal fuzzy number, first by finding mathematical expectation and then calculating...
Stability and Stabilization Condition for T-S Fuzzy Systems with Time-Delay under Imperfect Premise Matching via an Integral Inequality
Zejian Zhang, Dawei Wang, Xiao-Zhi Gao
Pages: 11 - 22
This paper focuses on the stability and stabilization analysis for the T-S fuzzy systems with time-delay under imperfect premise matching, in which the number of fuzzy rules and membership functions employed for the fuzzy model and fuzzy controller are different. By introducing an augmented Lyapunov-Krasovskii...
Liming Yang, Ribo Ju
Pages: 12 - 24
This paper presents a new feature selection framework based on the -norm, in which data are summarized by their moments of the class conditional densities. However, discontinuity of the -norm makes it difficult to find the optimal solution. We apply a proper approximation of the -norm and a bound on...
Pawan Lingras, Manish Joshi
Pages: 12 - 28
Researchers have proposed several Genetic Algorithm (GA) based crisp clustering algorithms. Rough clustering based on Genetic Algorithms, Kohonen Self-Organizing Maps, K-means algorithm are also reported in literature. Recently, researchers have combined GAs with iterative rough clustering algorithms...
Jalal Sadoon Hameed Al-bayati, Burak Berk Üstündağ
Pages: 12 - 23
Apple leaf disease is the foremost factor that restricts apple yield and quality. Usually, much time is taken for disease detection with the existing diagnostic techniques; therefore, farmers frequently miss the best time for preventing and treating diseases. The detection of apple leaf diseases is a...
Ebru Turanoğlu, İhsan Kaya, Cengiz Kahraman
Pages: 13 - 29
Acceptance sampling is primarily used for the inspection of incoming or outgoing lots. Acceptance sampling refers to the application of specific sampling plans to a designated lot or sequence of lots. The parameters of acceptance sampling plans are sample sizes and acceptance numbers. In some cases,...
Giovanna Castellano, Ciro Castiello, Vincenzo Pasquadibisceglie, Gianluca Zaza
Pages: 13 - 22
This paper introduces FISDeT, a tool to support the design of Fuzzy Inference Systems, composed of a set of Python modules sharing the standard specification language FCL used for FIS definition. FISDeT includes a graphical user interface that enables easy definition and quick update of elements composing...
Carlos Villaseñor, Nancy Arana-Daniel, Alma Y. Alanis, Carlos López-Franco, Esteban A. Hernandez-Vargas
Pages: 13 - 27
Artificial immune systems are metaheuristic algorithms that mimic the adaptive capabilities of the immune system of vertebrates. Since the 1990s, they have become one of the main branches of computer intelligence. However, there are still many competitive processes in the biological phenomena that can...
A generalization of the Perona-Malik anisotropic diffusion method using restricted dissimilarity functions
C. Lopez-Molina, B. De Baets, J. Cerron, M. Galar, H. Bustince
Pages: 14 - 28
There exists a large number of techniques for content-aware smoothing. Despite its simplicity, the Perona-Malik Anisotropic Diffusion method is among the most employed ones. In this work we study this method in detail and propose a generalization of its diffusion scheme using restricted dissimilarity...
Pages: 14 - 33
Group decision making problems which organize a group of experts to evaluate a set of alternatives with respect to several criteria are commonly discussed recently. Hesitant fuzzy linguistic term sets, characterized by a set of consecutive linguistic terms, act as a new model for qualitative settings...
Xiao-Dan Wu, Mohammad T. Khasawneh, Dian-Min Yue, Ya-Nan Chu, Zhan-Ting Gao
Pages: 15 - 25
Effective outpatient appointment scheduling aims at reducing patient waiting time and operational costs, and improving resource utilization, especially given the stochastic nature of patient arrivals. Unlike many western developed countries, China faces challenges due to imperfect appointment systems...
Forecasting Direction of Trend of a Group of Analogous Time Series Using F-Transform and Fuzzy Natural Logic
Vilém Novák, Irina Perfilieva
Pages: 15 - 28
We present an idea to group time series according to similarity of their local trends and to predict future direction of the trend of all of them on the basis of forecast of only one representative. First, we assign to each time series an adjoint one, which consists of a sequence of the F1-transform...
A Multiple Attribute Decision Making Approach Based on New Similarity Measures of Interval-valued Hesitant Fuzzy Sets
Yi Liu, Jun Liu, Zhiyong Hong
Pages: 15 - 32
Hesitant fuzzy sets, as an extension of fuzzy sets to deal with uncertainty, have attracted much attention since its introduction, in both theory and application aspects. The present work is focused on the interval-valued hesitant fuzzy sets (IVHFSs) to manage additional uncertainty. Now that distance...
Agustina Bouchet, Pelayo Quirós, Pedro Alonso, Virginia Ballarin, Irene Díaz, Susana Montes
Pages: 16 - 27
Gray scale edge detection can be modeled using Fuzzy Sets and, in particular, Interval-Valued Fuzzy Sets. This work is focused on studying the performance of several Interval-Valued Fuzzy Sets construction methods for detecting edges in a gray scale image. These construction methods are based on considering...
Support Vector Machines with Manifold Learning and Probabilistic Space Projection for Tourist Expenditure Analysis
Xin Xu, Rob Law, Tao Wu
Pages: 17 - 26
The significant economic contributions of the tourism industry in recent years impose an unprecedented force for data mining and machine learning methods to analyze tourism data. The intrinsic problems of raw data in tourism are largely related to the complexity, noise and nonlinearity in the data that...
Serge Guillaume, Brigitte Charnomordic, Bruno Tisseyre, James Taylor
Pages: 18 - 33
In many fields, due to the increasing number of automatic sensors and devices, there is an emerging need to integrate georeferenced and temporal data into decision support tools. Geographic Information Systems (GIS) and Geostatistics lack some functionalities for modelling and reasoning using georeferenced...
Xin Tong, Dong Wang, Jichun Wu, Yuanfang Chen, Xi Chen
Pages: 18 - 28
This paper uses Gumbel-Hougaard (G-H) copula, Clayton copula and Frank copula to construct joint distributions of hydrological variables of the two typical stations on the Yellow River Region, including the annual maximum flood magnitude (AMFM), the annual maximum flood occurrence date (AMFOD) and the...
An improved Particle Swarm Optimization Algorithm for QoS-aware Web Service Selection in Service Oriented Communication
Wenbin Wang, Qibo Sun, Xinchao Zhao, Fangchun Yang
Pages: 18 - 30
QoS-aware Web Service Selection is a crucially important issue in Service Oriented Communication which enables communication by integrating communication web services over Internet. Because of the growing number of candidate web services that provide the same functionality but differ in Quality of Service...
Vicenc Torra, Yasuo Narukawa
Pages: 19 - 23
WORD SIMILARITY FROM DICTIONARIES: INFERRING FUZZY MEASURES FROM FUZZY GRAPHS The computation of similarities between words is a basic element of information retrieval systems, when retrieval is not solely based on word matching. In this work we consider a measure between words based on dictionaries....
Hyung Joon Kook
Pages: 21 - 27
In a scientific domain, learning comprises studying a finite set of principles of the domain and applying them to solve a wide variety of problems. Therefore an intelligent tutoring system in a scientific domain is required to possess an adequate methodology to deal with this principle. We suggest a...
Observer based robust neuro-adaptive control of non-square MIMO nonlinear systems with unknown dynamics
Hassan Ghiti Sarand, Bahram Karimi
Pages: 23 - 33
This paper addresses a robust adaptive control problem of non-square nonlinear systems with unmeasurable states. The systems are assumed to be multi-input/multi-output subject to dynamical uncertainties and external disturbances. The approach is studied for two cases, i.e., underactuated and over-actuated...
Stefano Rovetta, Zied Mnasri, Francesco Masulli, Alberto Cabri
Pages: 23 - 35
Speech processing is quickly shifting toward affective computing, that requires handling emotions and modeling expressive speech synthesis and recognition. The latter task has been so far achieved by supervised classifiers. This implies a prior labeling and data preprocessing, with a cost that increases...
Assessment of Strategic R&D Projects for Car Manufacturers Based on the Evidential Reasoning Approach
Xin-Bao Liu, Mi Zhou, Jian-Bo Yang, Shan-Lin Yang
Pages: 24 - 49
Assessment of strategic R&D projects is in essence a multiple-attribute decision analysis (MADA) prob- lem. In such problems, qualitative information with subjective judgments of ambiguity is often provided by people together with quantitative data that may be imprecise or incomplete. A few approaches...
Liu Zheng, Zhao Tianlong, Han Huijian, Zhang Caiming
Pages: 24 - 35
Automatic image semantic annotation is of great importance for image retrieval, therefore, this paper aims to recommend tags for social images according to user preferences. With the rapid development of the image-sharing community, such as Flickr, the image resources of the social network with rich...
Le Wang, Lin Feng, Bo Jin
Pages: 25 - 36
Mining frequent itemsets over transaction data streams is critical for many applications, such as wireless sensor networks, analysis of retail market data, and stock market predication. The sliding window method is an important way of mining frequent itemsets over data streams. The speed of the sliding...
Guangquan Zhang, Jialin Han, Jie Lu
Pages: 25 - 34
Bi-level decision-making techniques aim to deal with decentralized management problems that feature interactive decision entities distributed throughout a bi-level hierarchy. A challenge in handling bi-level decision problems is that various uncertainties naturally appear in decision-making process....
Jasenka Djikanovic, Mirko Vujosevic
Pages: 25 - 35
The increment of the number of activities related to recycling and recovery of products are determined mostly, by the legal regulations, but also, by the needs of users. As a result, there is a large quantites of materials and products that have been returned from the market for a specific reason. This...
A QoS-oriented Web service composition approach based on multi-population genetic algorithm for Internet of things
Qian Li, Runliang Dou, Fuzan Chen, Guofang Nan
Pages: 26 - 34
Internet of things (IoT) will create new opportunities to build applications that better integrate real-time state of the industry. With Web services accomplishing similar function proliferated, industrial enterprises have to choose appropriate Web services according Quality of Service (QoS) properties....
Ashfaqur Rahman, Manzur Murshed
Pages: 27 - 38
Feature weighing methods are commonly used to find the relative significance among a set of features that are effectively used by the retrieval methods to search image sequences efficiently from large databases. As evidenced in the current literature, dynamic textures (image sequences with regular motion...
Signal Feature Extraction Using Granular Computing. Comparative Analysis with Frequency and Time Descriptors Applied to Dynamic Laser Speckle Patterns
Ana L. Dai Pra, Lucia I. Passoni, G. Hernan Sendra, Marcelo Trivi, Hector J. Rabal
Pages: 28 - 40
The laser dynamic speckle is a phenomenon caused by the fluctuant interference of the laser light reflected from an illuminated surface where some kind of activity is taking place. Signals generated by the intensity changes in each pixel through the sequence are processed with the finality of identifying...
Gülçin Büyüközkan, Jbid Arsenyan, Gürdal Ertek
Pages: 28 - 42
High quality web site has been generally recognized as a critical enabler to conduct online business. Numerous studies exist in the literature to measure the business performance in relation to web site quality. In this paper, an axiomatic design based approach for fuzzy group decision making is adopted...
Booma Devi Sekar, Jean-Baptiste Lamy, Nekane Larburu, Brigitte Séroussi, Gilles Guézennec, Jacques Bouaud, Naiara Muro, Hui Wang, Jun Liu
Pages: 28 - 38
Breast cancer is identified as the most common type of cancer in women worldwide with 1.6 million women around the world diagnosed every year. This prompts many active areas of research in identifying better ways to prevent, detect, and treat breast cancer. DESIREE is a European Union funded project,...
A System of Insolvency Prediction for industrial companies using a financial alternative model with neural networks
A.M. Callejón, A.M. Casado, M.A. Fernández, J.I. Peláez
Pages: 29 - 37
We find in the accounting literature the use of neural networks (NN) for the prediction of insolvency data from the last financial year before the bankruptcy, with a success rate below 85%. The objective of this work is to increase the predictive power of the NN models to discriminate between solvent...
Guven Kose, Hayri Sever, Mert Bal, Alp Ustundag
Pages: 29 - 44
A medical diagnosis system (DRCAD), which consists of two sub-modules Bayesian and rule-based inference models, is presented in this study. Three types of tests are conducted to assess the performances of the models producing synthetic data based on the ALARM network. The results indicate that the linear...
Jorge Tiago Bastos, Yongjun Shen, Elke Hermans, Tom Brijs, Geert Wets, Antonio Clóvis Pinto Ferraz
Pages: 29 - 38
In this paper, three risk indicators on road safety are combined into a composite indicator in order to assess the overall fatality risk for the 27 Brazilian states using the so-called multiple layer data envelopment analysis model. The states are first clustered and next, a range of bootstrapped scores...
Rough Sets as a Knowledge Discovery and Classification Tool for the Diagnosis of Students with Learning Disabilities
Yu-Chi Lin, Tung-Kuang Wu, Shian-Chang Huang, Ying-Ru Meng, Wen-Yau Liang
Pages: 29 - 43
Due to the implicit characteristics of learning disabilities (LDs), the diagnosis of students with learning disabilities has long been a difficult issue. Artificial intelligence techniques like artificial neural network (ANN) and support vector machine (SVM) have been applied to the LD diagnosis problem...
Guojun Mao, Xindong Wu, Xuxian Jiang
Pages: 30 - 38
Computer intrusions are taking place everywhere, and have become a major concern for information security. Most intrusions to a computer system may result from illegitimate or irregular calls to the operating system, so analyzing the system-call sequences becomes an important and fundamental technique...
Application of Bayesian Decision Theory Based on Prior Information in the Multi-Objective Optimization Problem
Xia Lei, Maozhu Jin, Qiang Wang
Pages: 31 - 42
General multi-objective optimization methods are hard to obtain prior information, how to utilize prior information has been a challenge. This paper analyzes the characteristics of Bayesian decision-making based on maximum entropy principle and prior information, especially in case that how to effectively...
Ferhat Özgür Çatak, Ahmet Fatih Mustacoglu
Pages: 33 - 44
The training techniques of the distributed machine learning approach replace the traditional methods with a cloud computing infrastructure and provide flexible computing services to clients. Moreover, machine learning-based classification methods are used in many diverse applications such as medical...
Michael R. Berthold, Bernd Wiswedel, Thomas R. Gabriel
Pages: 34 - 45
In this paper we describe the open source data analytics platform KNIME, focusing particularly on extensions and modules supporting fuzzy sets and fuzzy learning algorithms such as fuzzy clustering algorithms, rule induction methods, and interactive clustering tools. In addition we outline a number of...
Hairui Jia, Yang Xu, Yi Liu, Jun Liu
Pages: 34 - 43
Based on the academic ideas of resolution-based automated reasoning and the previously established research work on binary α-resolution based automated reasoning schemes in the framework of lattice-valued logic with truth-values in a lattice algebraic structure-lattice implication algebra (LIA),...
Pages: 34 - 55
Effective query expansion terms selection methods are really very important for improving the accuracy and efficiency of Pseudo-Relevance Feedback (PRF) based automatic query expansion techniques in information retrieval system. These methods remove irrelevant and redundant terms from the top retrieved...
Adaptive generalized ensemble construction with feature selection and its application in recommendation
Jin Tian, Nan Feng
Pages: 35 - 43
This paper presents an adaptive generalized ensemble method with refined feature selection strategy and self-adjusted mechanism for ensemble size. The coevolutionary algorithm is introduced to optimize the ensemble and the feature weighting. There are two stages in the proposed method. In the coevolutionary...
Pages: 35 - 42
In this study, we offer a general view at the area of fuzzy modeling and elaborate on a new direction of system modeling by introducing a concept of granular models. Those models constitute a generalization of existing fuzzy models and, in contrast to existing models, generate results in the form of...
Hua Zhao, Zeshui Xu, Zeqing Yao
Pages: 36 - 56
The interval-valued intuitionistic fuzzy set (IVIFS) generalizes Atanassov’s intuitionistic fuzzy set (A-IFS) with the membership and non-membership degrees being intervals instead of real numbers, so it can contain more information. In this paper, we study the derivatives and differentials under interval-valued...
N. Indira, S. Rukmanidevi, A.V. Kalpana
Pages: 36 - 43
The organization maintains various information in cloud which is a loosely coupled environment. However, the nature of cloud encourages the threats in different level. Among them the data security has been a keen issue being identified and challenges the service provider. To improve the data security...
Jeong-Gon Lee, Kul Hur, Young Bae Jun
Pages: 36 - 42
The generalization of N-structure is introduced first and then applied to BCH-algebra for research. The concepts of k-folded N-subalgebra, k-folded N-closed ideal and (closed) k-folded N-filter are introduced, and then their relations and several properties are investigated. Conditions for the k-folded...
Shazzat Hossain, M.A. Hussain, Rosli Bin Omar
Pages: 37 - 49
Industries are now moving towards PC-based control from PLC (Programmable Logic Control) based control as the PC (personal computer) is easily available and capable of implementing various control strategies to improve productivity. Advances in both hardware and software technology are expediting this...
Zhanhong Hu, Zichun Chen, Zheng Pei, Xinzi Ma, Wei Liu
Pages: 38 - 46
In this paper, we develop an improved ranking strategy for fuzzy multiple attribute group decision making. First, we introduce a method for multiple attribute group decision making and show that method can not choose the best alternative, when S() = 0 and . We define then a k-order deviation of the fuzzy...
Autonomously Implemented Versatile Path Planning for Mobile Robots Based on Cellular Automata and Ant Colony
Adel Akbarimajd, Akbar Hassanzadeh
Pages: 39 - 52
A path planning method for mobile robots based on two dimensional cellular automata is proposed. The method can be applied for environments with both concave and convex obstacles. It is also appropriate for multi-robot problems as well as dynamic environments. In order to develop the planning method,...
Limin Du, Yang Xu, Jun Liu, Fangli Ma
Pages: 39 - 47
This paper presents an improved genetic algorithm (GA) based feature selection method for imbalanced data classification, which is then applied to radio signal recognition of ground-air communication. The proposed method improves the fitness function while SVM is selected as the classifier due to its...
Furkan Yusuf YAVUZ, Devrim ÜNAL, Ensar GÜL
Pages: 39 - 58
Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing attacks are especially hard to defend against because of the ad-hoc nature of...
M. Kalaiselvi Geetha, S. Palanivel
Pages: 39 - 50
Appropriate organization of video databases is essential for pertinent indexing and retrieval of visual information. This paper proposes a new feature called Block Intensity Comparison Code (BICC) for video classification and an unsupervised shot change detection algorithm to detect the shot changes...
Portfolio Optimization From a Set of Preference Ordered Projects Using an Ant Colony Based Multi-objective Approach
S. Samantha Bastiani, Laura Cruz-Reyes, Eduardo Fernandez, Claudia Gomez
Pages: 41 - 53
In this paper, a good portfolio is found through an ant colony algorithm (including a local search) that approximates the Pareto front regarding some kind of project categorization, cardinalities, discrepancies with priorities given by the ranking, and the average rank of supported projects; this approach...
C Guada, D Gómez, JT. Rodríguez, J Yáñez, J Montero
Pages: 43 - 68
In this paper we discuss some main image processing techniques in order to propose a classification based upon the output these methods provide. Because despite a particular image analysis technique can be supervised or unsupervised, and can allow or not the existence of fuzzy information at some stage,...
Selcuk Cebi, Cengiz Kahraman
Pages: 43 - 55
The performance of a product depends on if it is created in terms of expected functional requirements. A product is designed to satisfy some certain tasks. In this study, the design of an automobile seat is handled. Automobile seat design procedure is based on experience and trial-and-error method, rather...
Yuanquan Shi, Xiaojie Liu, Tao Li, Xiaoning Peng, Wen Chen, Ruirui Zhang, Yanming Fu
Pages: 43 - 60
To solve chaotic time series prediction problem, a novel Prediction approach for chaotic time series based on Immune Optimization Theory (PIOT) is proposed. In PIOT, the concepts and formal definitions of antigen, antibody and affinity being used for time series prediction are given, and the mathematical...
Guo-Qing Cheng, Liang Wang, Ying-Ming Wang
Pages: 43 - 53
The traditional three-stage data envelopment analysis (DEA) model only measures exact input–output indicator data, but cannot perform efficiency analysis on uncertain data. The interval DEA method does not exclude the influence of external environmental factors. Therefore, this paper combines the traditional...
Soemon Takakuwa, Run Zhao, Hikaru Ichimura
Pages: 44 - 51
Material flow cost accounting (MFCA), an environmental management accounting method, is adopted to reduce the amount of wastes that result from manufacturing activities. In this paper, MFCA is introduced to study the environmental impacts of production lot-size determination by structuring simulation...
Lefeng Zhang, Zengping Wang
Pages: 44 - 52
During normal operation, doubly-fed induction generator (DFIG) can generate certain range of reactive power according to the requirements of the power grid. According to the active power order from power dispatching center, a kind of wind turbines scheduling solution which also suits the actual operation...
Xun Gong, Yong Yang, Jianhui Lin, Tianrui Li
Pages: 44 - 53
As facial expression is an essential way to convey human's feelings, in this paper, a dynamic selection ensemble learning method is proposed to analyze their emotion automatically. A feature selection algorithm is proposed at first based on rough set and the domain oriented data driven data mining theory,...
Pages: 44 - 55
As one suitable optimization method implementing computational intelligence, ant colony optimization (ACO) can be used to solve the traveling salesman problem (TSP). However, traditional ACO has many shortcomings, including slow convergence and low efficiency. By enlarging the ants' search space...
Gregorio Tirado, F. Javier Martín-Campo, Begoña Vitoriano, M. Teresa Ortuño
Pages: 45 - 57
Emergency management is a highly relevant area of interest in operations research. Currently the area is undergoing widespread development. Furthermore, recent disasters have highlighted the importance of disaster management, in order to alleviate the suffering of vulnerable people and save lives. In...
Hongbin Liu, Le Jiang, Zeshui Xu
Pages: 45 - 57
The probabilistic linguistic term sets (PLTSs) are powerful to deal with the hesitant linguistic situation in which each provided linguistic term has a probability. The PLTSs contain uncertainties caused by the linguistic terms and their probability information. In order to measure such uncertainties,...